<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Configuration-Exposure — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/configuration-exposure/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/configuration-exposure/feed.xml" rel="self" type="application/rss+xml"/><item><title>Prometheus Azure AD Remote Write OAuth Client Secret Exposure</title><link>https://feed.craftedsignal.io/briefs/2026-05-prometheus-oauth-secret-exposure/</link><pubDate>Wed, 06 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-prometheus-oauth-secret-exposure/</guid><description>The client_secret field in Prometheus' Azure AD remote write OAuth configuration was exposed in plaintext via the `/-/config` HTTP API endpoint, due to being incorrectly typed as a string, potentially allowing unauthorized access to sensitive credentials.</description><content:encoded><![CDATA[<p>A vulnerability exists in Prometheus versions 0.45.2 up to 3.11.3 (excluding 3.11.3) and before 3.5.3 LTS related to the handling of the Azure AD remote write OAuth client secret. The <code>client_secret</code> field, intended to be a sensitive value, was incorrectly typed as a string instead of a <code>Secret</code>. This caused Prometheus to expose the client secret in plaintext when serving the configuration via the <code>/-/config</code> HTTP API endpoint. Any user or process with access to this endpoint could potentially view the exposed secret, leading to unauthorized access to Azure resources. This vulnerability was introduced to versions &gt;=0.45.2 and affects versions &lt; 0.311.3. The issue has been resolved in versions 3.11.3 and 3.5.3 LTS by correctly typing the <code>ClientSecret</code> field in <code>OAuthConfig</code> as <code>Secret</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a Prometheus instance running a vulnerable version (&gt;= 0.45.2 and &lt; 0.311.3).</li>
<li>The attacker uses the <code>/-/config</code> HTTP API endpoint to retrieve the Prometheus configuration.</li>
<li>The API returns the configuration in plaintext format.</li>
<li>The attacker inspects the configuration data.</li>
<li>The attacker locates the <code>client_secret</code> field within the Azure AD remote write OAuth configuration section (<code>storage/remote/azuread</code>).</li>
<li>The client secret is exposed in plaintext within the configuration.</li>
<li>The attacker extracts the plaintext client secret.</li>
<li>The attacker uses the compromised client secret to authenticate to Azure AD and potentially gain unauthorized access to Azure resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to obtain the Azure AD client secret used for remote write authentication. This compromised secret can then be used to impersonate the Prometheus instance and potentially access or modify data within the associated Azure resources. The number of affected Prometheus instances is currently unknown, but organizations utilizing Azure AD remote write with OAuth authentication are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Prometheus version 3.11.3 or 3.5.3 LTS to patch CVE-2026-42151.</li>
<li>For users unable to upgrade immediately, switch to Managed Identity or Workload Identity authentication for Azure AD remote write as a workaround.</li>
<li>Monitor access to the <code>/-/config</code> HTTP API endpoint in your Prometheus instances using the provided Sigma rule to detect unauthorized attempts to retrieve the configuration.</li>
<li>Rotate the Azure AD client secret if you suspect your Prometheus instance was compromised.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>configuration-exposure</category><category>cloud</category></item></channel></rss>